General

  • Target

    jonathanfrith.co.document.12.23.2022.docm

  • Size

    1.3MB

  • Sample

    221224-wlw43sde7s

  • MD5

    1fd26f7168cef61ecfa03cbd2a9c7eec

  • SHA1

    818a19cdc8a28151083dd201cea5ebec0355a3fa

  • SHA256

    fcadf8c50d8b114cabd4509452b1a4f24f28f5b439179cae610dc037727d2077

  • SHA512

    7d90730e21fb2489d9cf71b127f9fc17b5275b2f4f6fda0cbe85eb707d9130851f29cbe7747808e1a79e2b99ea6343ee525cf78c11ff6f1d44039cccd72882ba

  • SSDEEP

    24576://JpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDuG7EzqHm+Bmcq:/xpJmgf3zliFppVKqG+K

Malware Config

Extracted

Family

icedid

Campaign

1212497363

Extracted

Family

icedid

Campaign

1212497363

C2

trbiriumpa.com

Targets

    • Target

      jonathanfrith.co.document.12.23.2022.docm

    • Size

      1.3MB

    • MD5

      1fd26f7168cef61ecfa03cbd2a9c7eec

    • SHA1

      818a19cdc8a28151083dd201cea5ebec0355a3fa

    • SHA256

      fcadf8c50d8b114cabd4509452b1a4f24f28f5b439179cae610dc037727d2077

    • SHA512

      7d90730e21fb2489d9cf71b127f9fc17b5275b2f4f6fda0cbe85eb707d9130851f29cbe7747808e1a79e2b99ea6343ee525cf78c11ff6f1d44039cccd72882ba

    • SSDEEP

      24576://JpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDuG7EzqHm+Bmcq:/xpJmgf3zliFppVKqG+K

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks